Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BIT-MI Deep Learning-based Model to Non-intrusive Speech Quality Assessment Challenge in Online Conferencing Applications., , , , , and . INTERSPEECH, page 3288-3292. ISCA, (2022)A General Framework of Trojan Communication Detection Based on Network Traces., , , , and . NAS, page 49-58. IEEE Computer Society, (2012)A Novel Partition Method for Busy Urban Area Based on Spatial-Temporal Information., , , , , and . ICCS (2), volume 11537 of Lecture Notes in Computer Science, page 234-246. Springer, (2019)ProDigger: Towards Robust Automatic Network Protocol Fingerprint Learning via Byte Embedding., , , and . Trustcom/BigDataSE/ISPA, page 284-291. IEEE, (2016)OpenVPN Traffic Identification Using Traffic Fingerprints and Statistical Characteristics., , , , and . ISCTCS, volume 320 of Communications in Computer and Information Science, page 443-449. Springer, (2012)Single-Channel Target Speaker Separation Using Joint Training with Target Speaker's Pitch Information., , , , , , , and . Odyssey, page 301-305. ISCA, (2022)MOS Predictor for Synthetic Speech with I-Vector Inputs., , , , , and . ICASSP, page 906-910. IEEE, (2022)Lightweight Dual-channel Target Speaker Separation for Mobile Voice Communication., , , , , , , , , and . CoRR, (2021)